Preface
Information in this Section
-
Book Overview
-
How This Book Is Organized
Book Overview
With the number of security countermeasures against user-land exploitation greater than ever these days, kernel-level exploitation is becoming increasingly popular among attackers and, generically, exploit writers. Playing with the heart of a computer's operating system can be a dangerous game. This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems—namely, UNIX derivatives, Mac OS X, and Windows.
Kernel exploits require both art and science to achieve. Every OS has its quirks, so every exploit must be molded to take full advantage ...
Get A Guide to Kernel Exploitation now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.